Security by Design

Keeping software secure has been a big topic for a long time. Microsoft came up with a plan called SD3+C in 2004, which is now called the Security Development Lifecycle. The Department of Homeland Security and Carnegie Mellon Software Engineering Institute also created a website to help software developers and …

Read More

Trust but verify

What is “Trust But Verify” in Cybersecurity? This concept emphasizes a multi-layered approach to security. While it’s important to establish trust with users, systems, and processes, it’s equally critical to continuously verify their legitimacy and security posture. This reduces the attack surface and minimizes the potential for breaches. Why is …

Read More

Don’t Let Hackers Win: How to Keep Your Applications Secure

Application security is a critical component of any company’s cybersecurity strategy. It is the process of identifying, identifying, and mitigating risks and vulnerabilities in software applications and systems. There are several reasons why a company needs application security.  First of all, application security helps to protect against data breaches and cyber …

Read More

Don’t be a Risky Business -Why Vendor Risk Assessments are Important

The What: Vendor risk assessments are an important part of managing the security and compliance of a company’s information technology systems. These assessments help organizations identify and mitigate risks associated with the use of third-party vendors and their products and services. In this article, we will discuss the reasons why …

Read More

6 Key Security Steps Companies Should Take Right Now

In this episode, Sammy provides valuable insights by sharing six crucial steps that businesses can take to safeguard their operations, as well as practical and fundamental measures to secure personal and professional environments.

Burnout in the Cybersecurity Industry

cybersecurity industry

The cybersecurity industry faces a high burnout because of the endless stream of threats and the passionate professional who feels they have to manage it all.

Data Security : Record Nation

Taking care of the hardware that contains your data makes logical sense. However, many companies are still losing their data on a daily basis

Sammy had a great discussion with Andy Breslow from Record Nation about it.

Data Privacy And Cybersecurity

Plan in advance. Assign a value to your various categories or tiers of information (digital assets) and keep your asset inventory updated. That way, if your customer data has been breached, you know the dollar value associated with that data and you have a plan to prioritize, recover and restore operations.

CyberSecurity Issues–in SPACE?!

satellite

Cyber Threats in Space: The New Challenges Ahead In the last few years, a new space race has been booming among government agencies. Now private space organizations have joined the race! These agencies and organizations are now working on and off the clock to advance into the future of the …

Read More

Mastodon Bug Found

If you haven’t heard of Mastodon, it is a decentralized social media platform that users are flocking to to replace Twitter. After Elon Musk purchased Twitter recently and laid off many Twitter employees, users were looking for a replacement. While Mastodon is different from the extremely popular social media networking …

Read More